c:\zbzsjksv\ulxwcwd\ooviueooya.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4ad808e9e188ee91baae1025aae0047b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ad808e9e188ee91baae1025aae0047b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ad808e9e188ee91baae1025aae0047b_JaffaCakes118
-
Size
552KB
-
MD5
4ad808e9e188ee91baae1025aae0047b
-
SHA1
5f2ed1914f0242568c987dd43a17ef16dba74e47
-
SHA256
cba51074ec580fa989820693d81f3c829b3219cd3b847373d615f6cf7621807d
-
SHA512
7ac057f22162c24252f80e6b44d0921e621e1173cc3af0c94ba58ef0cd31d1685f8135e6bf0b0d3c4bca2a23c70c06b831955509fe81ec96069e87501ec4742e
-
SSDEEP
12288:La7kJFz/S/0MeM3LWN9mSpuz5Yy18DxAtR0ZHZYcy2:Tl/S/ZeMiN9mSQYEEdHZs2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ad808e9e188ee91baae1025aae0047b_JaffaCakes118
Files
-
4ad808e9e188ee91baae1025aae0047b_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f0b33079a27d9e14c7934112bc8d161
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
DrawStatusTextW
InitCommonControlsEx
ImageList_SetBkColor
ImageList_SetFlags
MakeDragList
ImageList_Draw
ImageList_GetBkColor
ImageList_GetImageRect
ImageList_BeginDrag
ImageList_DragShowNolock
DrawStatusText
ImageList_DragEnter
ImageList_SetDragCursorImage
ImageList_Merge
ImageList_EndDrag
_TrackMouseEvent
DestroyPropertySheetPage
CreatePropertySheetPage
ImageList_Read
ImageList_Write
ImageList_Create
user32
RegisterWindowMessageW
MapWindowPoints
MsgWaitForMultipleObjects
InvertRect
UnpackDDElParam
SetProcessDefaultLayout
GetCursorPos
GetDesktopWindow
ShowCaret
DlgDirListW
GetKBCodePage
FindWindowExA
GetWindowTextLengthA
CreateWindowExW
DefWindowProcA
RegisterClassExA
MapVirtualKeyExA
GetAncestor
GetParent
DdeImpersonateClient
LoadAcceleratorsA
GetWindowLongA
MessageBoxExW
CountClipboardFormats
DrawCaption
LookupIconIdFromDirectoryEx
SetDlgItemTextW
MessageBoxA
RemoveMenu
DdeReconnect
RegisterClipboardFormatA
IsCharAlphaA
EnumThreadWindows
SendNotifyMessageW
DestroyWindow
WaitMessage
DrawEdge
ShowWindow
GetMonitorInfoA
GetSystemMetrics
CharPrevExA
InsertMenuW
DlgDirListComboBoxA
SetClassWord
CreateIconFromResourceEx
ShowCursor
TranslateAccelerator
ShowScrollBar
RegisterClassA
GetMessageTime
ReleaseCapture
TileWindows
SetMenuItemInfoA
ChildWindowFromPoint
SetWindowWord
LockWindowUpdate
GetWindowTextA
kernel32
GetConsoleOutputCP
GetTimeFormatA
GetDateFormatA
SetHandleCount
InterlockedIncrement
PulseEvent
SetStdHandle
ExitProcess
SetEnvironmentVariableA
HeapCreate
TlsSetValue
LCMapStringW
GetCurrentThreadId
LocalFileTimeToFileTime
FreeEnvironmentStringsW
UnhandledExceptionFilter
GetComputerNameW
FormatMessageA
RtlUnwind
GetLastError
VirtualFree
MultiByteToWideChar
FileTimeToDosDateTime
SetFileAttributesW
GetSystemTime
OpenSemaphoreW
FreeLibrary
SetFilePointer
SetConsoleOutputCP
GetStdHandle
UnlockFileEx
GetModuleHandleW
GetOEMCP
GetModuleFileNameW
GetStartupInfoW
GetTimeFormatW
GetEnvironmentStringsW
WaitForSingleObjectEx
IsBadWritePtr
HeapSize
HeapFree
LocalFlags
ReadConsoleInputW
Sleep
WriteConsoleA
LocalCompact
CompareStringW
GetCPInfo
SetConsoleCtrlHandler
HeapReAlloc
IsValidCodePage
EnumSystemLocalesA
InterlockedExchange
RemoveDirectoryA
IsValidLocale
ReadFile
OpenWaitableTimerA
GetCommandLineW
CloseHandle
CreateFileA
GetModuleFileNameA
GetSystemTimeAsFileTime
HeapDestroy
CreateMailslotA
GetVersionExA
VirtualLock
LCMapStringA
ReleaseMutex
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
GetACP
TlsGetValue
GetNumberFormatW
WriteConsoleW
GetVersionExW
GetCalendarInfoW
TransactNamedPipe
SetCriticalSectionSpinCount
IsDebuggerPresent
GetProfileStringW
VirtualAlloc
GetProcAddress
GetTimeZoneInformation
GetModuleHandleA
GetStringTypeA
SetFileTime
TerminateProcess
GetConsoleMode
SetUnhandledExceptionFilter
GetPrivateProfileStructW
EnumCalendarInfoExW
LeaveCriticalSection
FindResourceExW
GetCommandLineA
InterlockedDecrement
CreateThread
HeapAlloc
ExitThread
lstrcat
QueryPerformanceCounter
OpenMutexA
DebugBreak
AllocConsole
GetStringTypeW
FindNextFileW
EnumSystemLocalesW
GetConsoleCP
GetStartupInfoA
EnterCriticalSection
TlsAlloc
GetFileAttributesExA
GetLocaleInfoW
GetCurrentThread
CreateMutexA
ReadConsoleOutputAttribute
GetCurrentProcessId
GetTickCount
GetLongPathNameA
GetFileType
GetCurrentProcess
CompareStringA
VirtualQuery
SetCurrentDirectoryW
DebugActiveProcess
WriteFile
WideCharToMultiByte
LoadLibraryA
SetLastError
TlsFree
GetUserDefaultLCID
CreateToolhelp32Snapshot
DeleteCriticalSection
GetLocaleInfoA
FindFirstFileExA
MoveFileExA
shell32
InternalExtractIconListW
DragAcceptFiles
FreeIconList
comdlg32
LoadAlterBitmap
FindTextW
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ